You are here:

July 2016

For “Who Should Safeguard Our Data,” Wolff seems to think the sheep need to be taught a lesson. Specifically, she’s proposing to the elite thought leaders gathered at Aspen that the careless should be punished for getting hacked or for being in the vulnerability chain, even if unknowingly. The underlying reason for swapping out the […]

A panel charged with assessing Maryland’s vulnerability to cyberattacks recommended Friday that the state create a team of emergency personnel charged with defending its networks against hackers. The General Assembly created the Maryland Cybersecurity Council last year and asked for regular reports with ideas for how to better protect the state’s computers and other critical […]

There’s a gulf in the levels of cyber-hack preparedness among Southern Nevada businesses. An iconic city for hospitality and gaming, the industry titans on and near the Strip are investing big dollars in cybersecurity teams. The Las Vegas Sands Corp., MGM Resorts International and Caesars Entertainment “have tremendously great cybersecurity teams because they know the […]

Ben Dickson is a software engineer and freelance writer. He writes regularly on business, technology and politics. How to join the network Thanks to technologies that generate, store and analyze huge sets of data, companies are able to perform tasks that previously were impossible. But the added benefit does come with its own setbacks, specifically from a […]

An analysis of the MNKit exploit generator shows a connection between three cyberespionage campaigns believed to originate from China. MNKit is a software package with limited circulation that can embed exploit code inside Office files in order to create custom malware. This malware builder is specifically adapted to create malicious MHTML files that take advantage […]

The government yesterday signed a deal with Microsoft Corporation to get free real time information about cyber threat, which will allow it to protect its entities and combat dangers. Shahjahan Mahmood, chairman of Bangladesh Telecommunication Regulatory Commission (BTRC), and Sonia Bashir Kabir, managing director of Microsoft Bangladesh, signed the agreement on behalf of their respective […]

On one level, the motivation for organizations to invest in cybersecurity tools, staff, and processes couldn’t be more obvious: the organizations want to prevent cyberattacks from succeeding. It turns out, however, that security measures may be able to drive additional business benefits beyond simply countering hackers, online criminals, and other bad actors. The 2016 ATT/IDC […]

A cyber-espionage campaign targeting Eastern European government and public institutions has deployed a never-before-seen piece of malware called SBDH to infect victims and exfiltrate data. According to Czech security firm ESET, the malware was found on infected computers in Ukraine, Poland, Hungary, Slovakia, and the Czech Republic. SBDH malware uses simple distribution methods The unidentified […]

The infrastructure used by an Iranian cyberespionage group to control infected computers around the world has been hijacked by security researchers. Researchers from Palo Alto Networks came across the group’s activities earlier this year, but found evidence that it has been operating since at least 2007. Its main tool is a custom malware program dubbed […]

An analysis of the MNKit exploit generator shows a connection between three cyber-espionage campaigns believed to originate from China. MNKit is a software package with a limited circulation that can embed exploit code inside Office files in order to create custom malware. This malware builder is specially adapted to create malicious MHTML files that take […]